Skip to Search Skip to Content Skip to Footer
Sims Lifecycle Services
  • Locations
  • Blog
  • Client Portal
  • Contact
  • English
    • Deutsch
Menu
  • For Data Centers
    • Overview
    • Cloud Data Center Services
    • Colocation Data Center
    • Ultimate Decommissioning Guide
    • SLS plays a key role in helping companies manage ongoing technology shifts in data centers. Our record of success includes working with businesses, data centers and major cloud companies to provide periodic decommissioning of older data center equipment.
  • For Businesses
    • Overview
    • ITAD Services
      • RFP Template for ITAD
    • IT Asset Recovery
    • Data Destruction
      • On-Site Data Destruction
      • Bulk Data Destruction Services
      • Storage Device Types
      • Data Destruction Standards
      • Vendor Selection
    • On-Premise Data Center Decommissioning
    • E-Waste Recycling
    • ITAD Reporting and Portal
    • Logistics
    • Equipment We Process
    • SLS provides secure and compliant global IT asset disposition (ITAD), e-waste recycling and data center decommissioning services for businesses. We refurbish, repair and restore materials for continued useful life. In addition to facilitating reuse of equipment, SLS also recycles discarded electronics, transforming waste to raw material. Recycling diverts material from landfill or incineration and provides a feedstock for making next generation products.
  • For Manufacturers
    • Overview
    • Returns Management
    • Refining
    • Certified Destruction
    • Defense Contractors
    • Recycling
    • Extended Producer Responsibility
    • Portal and Reports
    • Recycling Innovation
    • How Computers Are Recycled
    • We work with manufacturers to manage reverse logistics and recover value from returned equipment. We resell whole units, manage spare parts recovery and responsibly recycle obsolete equipment. We also work with manufacturers in managing their extended producer responsibility requirements.
  • Global
    • Overview
    • Compliance
      • GDPR FAQ
    • Client Sustainability
      • Sustainability Reporting
      • Circular Economy Explained
    • International Associations
    • Consumer E-Waste
    • Leading companies trust SLS to provide a globally coordinated e-waste recycling and ITAD single solution with a high focus on data security, regulatory and corporate compliance, value recovery and sustainability.
  • About Us
    • Overview
    • Certifications
    • Sustainability at Sims
    • EH&S
    • Equipment We Process
    • Careers
    • As a business division of Sims Limited, SLS has the global reach, expertise, and infrastructure necessary to ensure to our customers that all electronic devices are processed in a secure and environmentally responsible manner.
  • News
    • Blog
    • Videos
    • Resources
    • Infographics
    • Press Releases
    • Backed by a global network of IT asset disposition and e-recycling facilities, SLS is a leader in compliant disposition and recycling of electronic equipment. Stay up-to-date with our press releases, blog, newsletter, case studies, white papers, tip sheets, infographics and videos.

NEW! - HOW TO GUIDE: Template for Developing IT Asset Disposition (ITAD) RFP

Get Your Copy

Hidden Threats That Exist Within Your IT Assets

Menu
  • Locations
  • Blog
  • Client Portal
  • Contact
July 24, 2018
by SLS Media

Risk Based Security reported that 8 billion records were compromised by 5,207 data breaches in 2017. The average breach costs companies $3.62 million (€2.69 million), according to global research conducted by Ponemon Institute for their 2017 Cost of Data Breach Study: Global Overview. Contributing to that hefty tab are legal defense fees, regulatory noncompliance penalties, data breach notification costs, revenue losses from increased customer turnover, and the expense of repairing a damaged reputation.

Stipulating how sensitive information must be handled and preventing the potentially devastating consequences of a data breach are central to the numerous privacy regulations in effect throughout the world. These measures compel organizations to protect personal identifiable information in all its forms, including electronic data, or be subject to substantial fines. Global standards that exist are just the minimum requirements expected from IT asset disposition vendors. Other security measures vary depending on the client and their unique needs.

Where data lurks

The actions of hackers and negligent employees or contractors were responsible for more than 918 data breach incidents globally in the first half of 2017. With so much at stake, most data security efforts are justifiably focused on protecting electronic equipment currently in use. These devices are subject to clearly defined security procedures that protect the equipment and the data they contain from intrusion, loss and unauthorized access.

Electronics marked for disposal

On occasion, computers and other electronic devices marked for disposal fall outside those established security protocols even though they may still contain easily accessible data that can leave an organization vulnerable to a data breach incident.

This data exists not just in computer and server hard drives that have been declared obsolete or redundant, but across a wide array of devices including copiers, printers, scanners and fax machines. Two office workhorses—copiers and printers—often have hard drives that store readily obtainable data and can be the unexpected source of a data breach.

For corporate data security experts, protecting the data on all devices is the foundation of their data security policies and procedures. Most people are aware of the significant data security risks posed by failing to eliminate information from computer and server hard drives and understand the need to destroy the data on these devices.

Solid state drives

Devices equipped with solid-state drives look similar to traditional magnetic hard drives but are often smaller, more durable and store data on flash memory chips which have no moving parts. Solid-state drives require special processing to ensure all data has been removed. For instance, an absence of magnetic components makes solid-state drives impervious to degaussing. Also, currently available hard drive wiping techniques may give the appearance of complete data erasure during verification, but recoverable data may remain due to the unique recording storage and organizational characteristics of this technology. It is important to validate that any data destruction methods being implemented are truly removing all data from the solid state drive on the flash translation layer and all sectors.

Mobile devices

A growing number of employees who are allowed to use their own mobile devices, such as smartphones or tablets, to connect to corporate networks, email accounts or file-sharing applications can also put confidential data at risk. Whether company or employee-owned, mobile devices have computing power and data storage capacity that rival some desktop and laptop machines. Their size and popularity however make them more vulnerable to loss and theft, substantially increasing the data security risk posed by mobile technology.

Unlike computers and servers whose contents are subject to strict security protocols retired, broken, or employee-owned mobile devices sometimes fall outside the scope of these policies, setting up the possibility of a data breach. Also keep in mind that many smartphones and tablets are equipped with solid-state technology, making them subject to the same data erasure challenges as other devices using this technology to record, store and access data.

Assessing the risk

It comes as no surprise that data can be stored and accessed in more places than ever, but not all IT assets are created equal. As an IT asset manager, it is important to understand which IT assets bear more risk than others and which types of threats exist with each.

When managing retired IT and electronic equipment, physical theft is going to be of primary concern. Physical theft as opposed to systems hacks are prevented in different ways. When questioning your vendor’s security systems, you can start by reviewing their certifications. If you want to take it a step further there are things you can look for in a vendor beyond security certifications. Read our recent blog post for more information about what you need to look for, beyond certifications, to mitigate ITAD security threats.

Learn more about ITAD security standards to look for.

Posted in: Global ITAD Solutions, IT Asset Disposition
Previous Post Next Post

Circular Newsletter

Data Center Services

Learn More

Regions

  • Americas
  • Global
  • EMEA
  • APAC

Topics

Archives

Sims Lifecycle Services
  • Corporate Information
    • About Us
    • Certifications
    • Locations
  • Services
    • For Data Centers
    • For Businesses
    • For Electronics Manufacturers
    • Data Destruction
    • Global Services
  • Contact
    • Email
    • News
    • Blog
  • Sims Limited
    • SLS is a business division of Sims Limited. Discover how Sims Limited plays an integral role in the circular economy by making resources available for future use.
      Visit the Sims Limited Website
  • Other Business Divisions (external websites)
    • Sims Metal
    • Sims Resource Renewal

Sign up for our newsletter

  • Visit Us on Instagram (opens new window)
  • Visit Us on Facebook (opens new window)
  • Visit Us on LinkedIn (opens new window)
Copyright © 2025 Sims Lifecycle Services, All Rights Reserved.
  • Privacy Policy
  • Legal
  • Terms of Use